Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,

Slides:



Advertisements
Similar presentations
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Advertisements

A Presentation by: Noman Shahreyar
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
1 Placement of Continuous Media in Wireless Peer-to-Peer Networks Shahram Ghadeharizadeh, Bhaskar Krishnamachari, Shanshan Song, IEEE Transactions on Multimedia,
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
1 Rateless Packet Approach for Data Gathering in Wireless Sensor Networks Dejan Vukobratovic, Cedomir Stefanovic, Vladimir Crnojevic, Francesco Chiti,
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Placement of Continuous Media in Wireless Peer-to-Peer Network Shahramram Ghandeharizadeh, Bhaskar Krishnamachari, and Shanshan Song IEEE Transactions.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
1 Fountain Codes Based Distributed Storage Algorithms for Large-scale Wireless Sensor Networks Salah A. Aly, Zhenning Kong, Emina Soljanin IEEE IPSN 2008.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
An Adaptive Probability Broadcast- based Data Preservation Protocol in Wireless Sensor Networks Liang, Jun-Bin ; Wang, Jianxin; Zhang, X.; Chen, Jianer.
An adaptive framework of multiple schemes for event and query distribution in wireless sensor networks Vincent Tam, Keng-Teck Ma, and King-Shan Lui IEEE.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Distributed Location-aware Transmission for Ad-Hoc Networks Bey-Ling Su 1/29/2004.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Growth Codes: Maximizing Sensor Network Data Persistence abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein Columbia University, Google Inc. (SIGSOMM’06)
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
A Reservation-based TDMA Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks Amitabha Das and Tingliang Zhu, Nanyang Technological.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Ching-Ju Lin Institute of Networking and Multimedia NTU
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
1 GPS-Free-Free Positioning System for Wireless Sensor Networks Farid Benbadis, Timur Friedman, Marcelo Dias de Amorim, and Serge Fdida IEEE WCCN 2005.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 VLM 2 : A Very Lightweight Mobile Multicast System For Wireless Sensor Networks Anmol Sheth, Brian Shucker and Richard Han University of Colorado, Department.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Event query processing based on data-centric storage in wireless sensor networks Longjian Guo, Yingshu Li, and Jianzhong Li IEEE GLOBECOM Technical Conference.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Max do Val Machado Raquel A. F. Mini Antonio A. F. Loureiro DCC/UFMG DCC/PUC Minas DCC/UFMG IEEE ICC 2009 proceedings Advisor : Han-Chieh Chao Student.
Density-Aware Hop-Count Localization (DHL) in Wireless Sensor Networks with Variable Density Sau Yee Wong 1,2, Joo Chee Lim 1, SV Rao 1, Winston KG Seah.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
Scalable and Distributed GPS free positioning for Sensor Networks Rajagopal Iyengear and Biplab Sikdar IEEE International Conference on Communications.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
Introduction to Wireless Sensor Networks
Presentation transcript:

Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications, ICC '09. IEEE International Conference on

Outline Introduction Network model and assumptions Distributed storage algorithm Encoding operations Decoding operations DSA-I analysis DSA-II algorithm without knowing global information Practical aspects Performance and simulation results

Introduction Wireless sensor networks consist of small devices (nodes) with limited CPU, bandwidth, and power. One needs to design storage strategies to collect sensed data from those sensors before they disappear suddenly from the network. Sensors are distributed randomly and cannot maintain routing tables or network topology. Some nodes might disappear from the network. In this paper we assume a new model where all n nodes in N can sense and store data. Each sensor has a buffer of total size M.

Introduction Previous works [1], [5] have used fountain codes with random walks to distribute data from a set of sources k to a set of storage nodes n >> k. In this paper We generalize this scenario where a set of n sources disseminate their data to a set of n storage nodes. All nodes serve as sensors/sources as well as storage/receiver nodes Take less computational time One does not need to query all nodes in the network in order to retrieve information about all n nodes. One can query only one arbitrary node u in a certain region [1] S. A. Aly, Z. Kong, and E. Soljanin. Fountain codes based distributed storage algorithms for wireless sensor networks [5] A. G. Dimakis, V. Prabhakaran, and K. Ramchandran. Distributed fountain codes for networked storage

Network model r N(u) : the set of neighbors of a node u. d(u) : the number of neighbors with a direct connection The mean degree of a graph G :

Assumptions Let be a set of sensing nodes that are distributed randomly and uniformly in a field. Each sensor acts as both a sensing and storage node. Every node does not maintain routing or geographic tables, and the network topology is not known. Every node can send a flooding message to the neighboring nodes. Every node si can detect the total number of neighbors by broadcasting a simple query message The degree d(u) of this node is the total number of neighbors with a direct connection.

Assumptions Every node has a buffer of size M and this buffer can be divided into smaller slots, each of size c, such that The first slot of a node u is reserved for its own sensing data. Every node s i prepares a packet packetsi with its Every node draws a degree d u from a degree distribution Ω is. If a node decided to accept a packet, it will also decide on which buffer slot it will be stored.

Distributed storage algorithm (DSA-I) Encoding Operations Initialization Encoding/flooding Storage phases Decoding Operations

Encoding operations Initialization Phase: The node s i in the initialization phase prepares a The node s i broadcasts this packet to all neighboring nodes N(s i ). : hop count flag : whether the data is new or an update of a previous value

Encoding operations Encoding and Flooding Phase: After the flooding phase, every node u receiving the packetsi will check ID si, accept the data x si with probability one The node u will decrease the counter by one as The node u will select a set of neighbors that did not receiver the message x si and it will unicast this message to them.

For an arbitrary node v that receives the message from u, it will check if the x has been received before If not, then it will decide whether to accept or reject it based on a random value drawn from The node v will check if the counter is zero, otherwise it will decrease it and send this message to the neighboring Encoding operations

Storage Phase: Every node will maintain its own buffer by storing a copy of its data and other node’s data. Also, a node will store a list of nodes ID’s of the packets that reached it. All nodes would receive, send, and store their own and neighboring data. Therefore, each node will have some information about itself and other nodes in the network. Encoding operations

Decoding operations The stored data can be recovered by querying a number of nodes from the network. Let n be the total number of alive nodes; assume that every node has m buffer slots such that, c is a small buffer size, M is the total buffer size in a node. To retrieve the information about the n variables, the data collector needs to query at least (1+ )n/m nodes

Algorithm

DSA-I analysis Lemma 1: On average, with a high probability, the total number of steps for one packet originated by a node u in one branch in DSA-I is O(n/ μ ) Proof: Let u be a node originating a packet with degree d(u). We know that every packet originated from a node u has a counter given by Let μ be the mean degree of the graph representing the network N.

DSA-I analysis

DSA-II algorithm without knowing global information DSA-II is totally distributed without knowing global information. Inference Phase : Let v be a node connected to a source node u. Let b v be the degree of a node v without adding nodes in N(u) We can approximate the counter c(u) as The encoding operations of DSA-II algorithm are similar to encoding operations of DSA-I algorithm. Cu : a parameter that will depend on the network condition and node’s degree.

DSA-II algorithm without knowing global information Lemma 3: The total number of transmissions required to disseminate the information from any arbitrary node throughout the network for the DSA-II is given by : λ :the average node density

Practical aspects The main advantages of the proposed algorithms : 1. One does not need to query all nodes in the network in order to retrieve information about all n nodes. Only need %20 − %30 2. One can query only one arbitrary node u in a certain region in the network to obtain an information about this region. 3. The DSA-I and DSA-II algorithms proposed in this paper are superior in comparison to the CDSA- and CDSA-II storage algorithms proposed in [1], [2]. [1] S. A. Aly, Z. Kong, and E. Soljanin. Fountain codes based distributed storage algorithms for wireless sensor networks [2] S. A. Aly, Z. Kong, and E. Soljanin. Raptor codes based distributed storage algorithms for wireless sensor networks.

Data update : A packet from the node u : Assume x be the new sensed data from the node u : Also, the node v will check if ID u is in its own list : Practical aspects 0 1

Performance and simulation results h : the total number of queries needed to recover those n variables. h/n : the decoding ratio as the total queried nodes divided by n

Performance and simulation results